메뉴 건너뛰기




Volumn 8792, Issue , 2014, Pages 462-475

A novel hybrid key revocation scheme for wireless sensor networks

Author keywords

Key revocation; Secret sharing; Wireless sensor networks

Indexed keywords

NETWORK SECURITY; WIRELESS SENSOR NETWORKS;

EID: 84908680720     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11698-3_35     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 3
    • 84884723585 scopus 로고    scopus 로고
    • Novel Distributed Key Revocation Scheme for Wireless Sensor Networks
    • Chao, C.H., Yang, C.F., Lin, P.T., Li, J.S.: Novel Distributed Key Revocation Scheme for Wireless Sensor Networks. Security and Communication Networks 6(10), 1271–1280 (2013)
    • (2013) Security and Communication Networks , vol.6 , Issue.10 , pp. 1271-1280
    • Chao, C.H.1    Yang, C.F.2    Lin, P.T.3    Li, J.S.4
  • 5
    • 33747171940 scopus 로고    scopus 로고
    • The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols
    • Choo, K.K.R., Boyd, C., Hitchcock, Y.: The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications 29(15), 2788–2797 (2006)
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2788-2797
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 6
    • 49749124613 scopus 로고    scopus 로고
    • A key Pre-distribution Scheme for Wireless Sensor Networks Using Hexagonal Deployment Knowledge
    • Jiang, Y., Shi, H.: A key Pre-distribution Scheme for Wireless Sensor Networks Using Hexagonal Deployment Knowledge. Chinese Journal of Electronics 17(3), 520–525 (2008)
    • (2008) Chinese Journal of Electronics , vol.17 , Issue.3 , pp. 520-525
    • Jiang, Y.1    Shi, H.2
  • 7
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 8
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level μTESLA: Broadcast authentication for distributed sensor networks
    • Liu, D., Ning, P.: Multi-level μTESLA: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys. 3(4), 800–836 (2004)
    • (2004) Trans. on Embedded Computing Sys , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 11
    • 38549152403 scopus 로고    scopus 로고
    • KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks
    • Wang, Y., Ramamurthy, B., Zou, X.: KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. In: International Conference on Communications, pp. 1260–1265 (2007)
    • (2007) International Conference on Communications , pp. 1260-1265
    • Wang, Y.1    Ramamurthy, B.2    Zou, X.3
  • 13
    • 67650672499 scopus 로고    scopus 로고
    • Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks
    • Zeng, P., Cao, Z., Choo, K.K.R., Wang, S.: Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Communications Letters 13(6), 426–428 (2009)
    • (2009) IEEE Communications Letters , vol.13 , Issue.6 , pp. 426-428
    • Zeng, P.1    Cao, Z.2    Choo, K.K.R.3    Wang, S.4
  • 14
    • 77954732460 scopus 로고    scopus 로고
    • On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks
    • Zeng, P., Cao, Z., Choo, K.K.R., Sun, D.: On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks. IEEE Transactions on Consumer Electronics 56(2), 566–569 (2010)
    • (2010) IEEE Transactions on Consumer Electronics , vol.56 , Issue.2 , pp. 566-569
    • Zeng, P.1    Cao, Z.2    Choo, K.K.R.3    Sun, D.4
  • 18
    • 84884730529 scopus 로고
    • An optimal Class of Symmetric Key Generation Systems
    • In: Beth, T., Cot, N., Ingemarsson, I. (eds.), Springer, Heidelberg
    • Blom, R.: An optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
    • (1985) EUROCRYPT 1984. LNCS , vol.209 , pp. 335-338
    • Blom, R.1
  • 20
    • 33748989560 scopus 로고    scopus 로고
    • Key Management for Mobile Sensor Networks
    • In: Burmester, M., Yasinsac, A. (eds.), Springer, Heidelberg
    • Sánchez, D.S., Baldus, H.: Key Management for Mobile Sensor Networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 14–26. Springer, Heidelberg (2006)
    • (2006) MADNES 2005. LNCS , vol.4074 , pp. 14-26
    • Sánchez, D.S.1    Baldus, H.2
  • 21
    • 36249010323 scopus 로고    scopus 로고
    • Secure Path-Key Revocation for Symmetric Key Predistribution Schemes in Sensor Networks
    • In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.), Springer, Boston
    • Moore, T., Clulow, J.: Secure Path-Key Revocation for Symmetric Key Predistribution Schemes in Sensor Networks. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 157–168. Springer, Boston (2007)
    • (2007) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP , vol.232 , pp. 157-168
    • Moore, T.1    Clulow, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.